Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for identity verification

a verification system and identity technology, applied in the field of identity verification, can solve problems such as drawbacks in the verification process, fraudulent use of personal computers and the internet, and unauthorized access and use of services by unauthorized persons

Active Publication Date: 2008-11-18
SAHOTA HARVINDER +1
View PDF16 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0012]An aspect of a preferred embodiment of the invention is a system for verification of a user's identity in a transaction performed using a personal computer connected to the Internet. The system comprises a personal computer connectable to the Internet. The personal computer has identification information unique to the personal computer. A card reader is coupled to the personal computer to communicate data to the personal computer. A personal identification card has access information stored thereon. The card is engageable with the card reader to transfer the access information from the card to the personal computer via the card reader. The access information from the card is combined with the identification information unique to t

Problems solved by technology

While many of these transactions are between honest parties, some persons fraudulently use personal computers and the Internet to obtain goods, services, or both goods and services (hereinafter “products”) without payment, and to induce payment from others for products that were never provided.
Additionally, some unauthorized persons access and use services provided via the Internet that were intended for a specific audience or that require fees for access.
This verification process has drawbacks.
The thief obtains the payment, but never provides the products.
With this false identity, the thief obtains payment from the buyer, but the thief never provides the products.
Not only is the thief an unauthorized user, but the third-party may be billed for the service that the third party did not request or access.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for identity verification
  • System and method for identity verification
  • System and method for identity verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]Reference is now made to the drawings wherein the like numbers refer to like aspects throughout.

[0027]In the preferred embodiment described herein, a system and associated method facilitate verification of a user's identity in one or more Internet-related personal computer transactions. The one or more Internet-related personal computer transactions may be the same or different transactions.

[0028]In particular embodiments, the system and method facilitate verification of a buyer's identity in an Internet-related personal computer purchase transaction. The system and method may also facilitate verification of a seller's identity in an Internet-related personal computer purchase transaction. The system and method may also facilitate verification of a buyer's identity and a seller's identity in an Internet-related personal computer purchase transaction.

[0029]In further embodiments, the system and method facilitate verification of a user's identity in an Internet-related personal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method to verify a user's identity in an Internet-related transaction. One system and method use a personal computer having identification information, a card reader, and a personal identification card having access information, to verify a user's identity using the access information and the identification information. Another system and method use a personal computer, a card reader, and a personal identification card having access information, wherein the card reader is included as part of a mouse coupled to the personal computer and wherein a user's identity is verified using the access information. Another system and method use a personal computer, a fingerprint reader, a card reader, and a personal identification card having access information to verify a user's identity using the access information and the data of the fingerprint reader.

Description

REFERENCE TO DISCLOSURE DOCUMENT[0001]This application relates to Disclosure Document No. 471911.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates generally to identity verification, and, more particularly, relates to identity verification in Internet-related personal computer transactions.[0004]2. Description of the Related Art[0005]Persons and businesses use the Internet to facilitate transactions. While many of these transactions are between honest parties, some persons fraudulently use personal computers and the Internet to obtain goods, services, or both goods and services (hereinafter “products”) without payment, and to induce payment from others for products that were never provided. Additionally, some unauthorized persons access and use services provided via the Internet that were intended for a specific audience or that require fees for access.[0006]As used herein, a “personal computer” is a computer designed for an individual use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06F12/14G06F7/04H04L9/00G06F21/00G06Q20/36G06Q20/38
CPCG06F21/32G06F21/34G06Q20/3674G06Q20/382
Inventor SAHOTA, HARVINDERSAHOTA, NEIL
Owner SAHOTA HARVINDER